With this integration, ThreatConnect users have the ability to import Reports and Indicators, along with all of their context, from the Dragos WorldView API into ThreatConnect. Users gain the necessary information and relevance to identify malicious actors and activity targeting industrial control networks globally. This knowledge enables industrial control system (ICS) defenders to make tactical and strategic recommendations about their environments quickly and confidently.

ThreatConnect VP of Product Andy Pendergast said, "Malicious actors are increasingly targeting OT (operational technology) networks. With Dragos Worldview intelligence integrated into ThreatConnect, we can bridge the gap that these actors often exploit between the IT and OT networks. Security teams are able to keep situationally aware of threats relevant to them, alert on any related activity to these threats in their IT networks and act on them efficiently with any of our dozens of integrations into their standard security controls.”

For more information about ThreatConnect’s integration with Dragos WorldView, we invite you to join us for our upcoming webinar, The Diamond: An Analyst’s Best Friend on Tuesday, September 18th at 2:00pm EST. To register or for more information, please visit: https://go.threatconnect.com/diamond-model-webinar

About ThreatConnect

ThreatConnect Inc.®, the pioneer in threat intelligence platforms, arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis, automation, and orchestration needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide use the ThreatConnect platform to integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection and response time for enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: https://www.threatconnect.com/

Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.

An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy i...